International Conference Papers
Permanent URI for this collectionhttp://dl.cerist.dz/handle/CERIST/4
Browse
5 results
Search Results
Item Random Feedbacks for Selfish Nodes Detection in Mobile Ad Hoc Networks(Springer, 2005-10) Djenouri, Djamel; Ouali, Nabil; Mahmoudi, Ahmed; Badache, NadjibA mobile ad hoc network (MANET) is a temporary infrastructureless network, formed by a set of mobile hosts that dynamically establish their own network on the fly without relying on any central administration. Mobile hosts used in MANET have to ensure the services ensured by the powerful fixed infrastructure in traditional networks, the packet forwarding is one of these services. Resource limitation of MANET’s nodes, particulary in energy supply, along with the multi-hop nature of these networks may cause a new problem that does not exist in traditional networks. To save its energy a node may behave selfishly(no-cooperatively), thus it misbehaves by not forwarding packets originated from other nodes, while using their resources to forward its own packets to remote recipients. Such a behavior hugely threatens the QoS (Quality of Service), and particulary the packet forwarding service availability. Some solutions for selfish nodes detection have been recently proposed, but almost all these solutions rely on the monitoring in the promiscuous mode technique of the watchdog [1], which suffers from many problems especially when using the power control technique. In this paper we propose a new approach to detect selfish nodes unwilling to participate in packet forwarding, that mitigates some watchdog’s problems. We also assess the performance of our solution by simulation.Item Cross-Layer Approach to Detect Data Packet Droppers in Mobile Ad-Hoc Networks(Springer, 2006-09) Djenouri, Djamel; Badache, NadjibMobile ad hoc networks (MANETs) are dynamic infrastructureless networks whose routing protocols are fully based on node cooperation, and where each mobile node relies on other intermediate mobile nodes to send packets towards remote ones. Being anxious about its battery shortage, a node participating in the network and using the forwarding service provided by other nodes might behave selfishly and drop packets originated from others. Such a behavior hugely threatens the QoS (Quality of Service), and particulary the packet forwarding service availability. Another motivation to drop data packets is to launch a DoS (Denial of Service) attack. To do so, a node participates in the routing protocol and includes itself in routes then simply drops data packet it receives to forward. We propose in this paper a novel cross-layer based approach to detect data packet droppers, that we optimize and decrease its overhead. Contrary to all the current detective solutions, ours is applicable regardless of the power control technique employment.Item Testimony-Based Isolation: New Approach to Overcome packet Dropping Attacks in MANET(John Moors University, 2006-06) Djenouri, Djamel; Badache, NadjibAttackers could take advantage of the cooperative nature of MANET’s routing protocols, by participating in the route discovery procedure to include themselves in routes, then simply drop data packets during the forwarding phase, aiming at a DoS (Denial of Service) attack. In this paper we deal with the detection and isolation of such malicious nodes. We first propose a monitoring technique different from the promiscuous overhearing (watchdog) used by almost all the current solutions, that overcomes many watchdog’s shortcomes. After that we propose a testimony-based isolation protocols basing on our monitoring technique.Item On Securing MANET Routing Protocol Against Control Packet Dropping(IEEE Computer Society, 2007-07) Djenouri, Djamel; Mahmoudi, Othmane; Bouamama, Mohamed; Liewellyn-Jones, David; Merabti, MadjidIn this manuscript we deal with securing routing protocols of mobile ad hoc networks (MANETs) against packet dropping misbehavior. More specifically, we propose a solution to protect control packets of reactive source routing protocols against. Most current proposals focus on data packets. Nonetheless, dropping control packets may be beneficial for selfish nodes and malicious ones as well. For example, simply by dropping RREQ (Route Request) packets a selfish node could exclude itself from routes and thereby avoid receiving data packets to forward. Similarly, a malicious could drop RERR (Route Error) packets to keep the use of failed routes, potentially resulting in a denial of service. Our solution could be intergraded with any source routing protocol. For the implementation in this work, we have chosen one of the most secure protocols, namely ENDAIRA. We assess our solution by an extensive simulation study.Item On Detecting Packets Droppers in MANET: A Novel Low Cost Approach(IEEE Computer Society, 2007-08) Djenouri, Djamel; Fahad, Tarek; Askwith, RobertOne of the commonest threats that mobile ad hoc networks are vulnerable to is data packet dropping, which is caused either by malicious or selfish nodes. Most of the existing solutions to solve such misbehaviour rely on the watchdog technique, which suffers from many drawbacks, particularly when using the power control technique. To overcome this problem with a moderate communication overhead, this paper introduces a new approach for detecting misbehaving nodes that drop data packets in MANET. It consists of two stages the monitoring stage in which each node monitors its direct neighbours with respect to forwarding data packets of a traffic session in the network, and the decision stage, in which direct neighbouring nodes decide whether the monitored node misbehave or not. Our new approach is able to detect the misbehaviour in case of power control employment, with a low communication overhead compared to the existing approaches.